1/101
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
INTERNET THREATS
The internet enables fast communication, education, innovation, and open data sharing, making it a key part of modern life
○ Global connectivity fosters innovation but also exposes systems to exploitation by malicious actors
○ Users must balance benefits with the need to protect personal data and maintain safe online practices
Global connectivity
fosters innovation but also exposes systems to exploitation by malicious actors
Innovation & Connectivity
Facilitates knowledge sharing, collaboration, and rapid communication
Exploitation Targets
Attackers exploit system vulnerabilities for financial, political, or personal gain
Inherent Risks
Every online interaction carries risks, emphasizing the need for secure practices
Financial & System Losses
Fraud, critical system corruption, and operational disruption
Identity Theft Impact
Stolen identities exploited for fraudulent activities, causing legal and financial complications
Reputational Damage
Cyberattacks expose sensitive data, harming organizations’ credibility
Malware (Malicious Software)
Programs designed to infiltrate and damage computers or networks
Viruses
Spread by infecting files and applications
Worms
Self-replicating, spread through networks without user action
Ransomware
Encrypts user data, demands payment for restoration
Spyware
Secretly gathers user info without consent
Phishing & Social Engineering
Fraudulent attempts to trick users into revealing sensitive data via fake emails, websites, or messages
○ Often disguised as trustworthy entities (banks, popular services)
○ Exploits psychological manipulation
Denial-of-Service (DoS) & Distributed DoS (DDoS)
Flood servers or networks with traffic, making services unavailable
Distributed DoS (DDoS)
Uses multiple sources, making attacks more potent
Man-in-the-Middle (MitM) Attacks
Intercept communications between two parties to steal or alter data unnoticed
Zero-Day Exploits
Target unknown or unpatched software/hardware vulnerabilities before developers release fixes
Identity Theft & Data Breaches
Unauthorized access to personal or organizational data leading to financial, legal, and reputational harm
Individual Hackers
Driven by curiosity, challenge, revenge, or financial gain
Cybercriminal Groups
Organized networks targeting large-scale financial fraud, blackmail, or data theft
Hacktivists
Politically or socially motivated groups using cyberattacks to promote ideologies
State-Sponsored Attackers
Governments targeting other nations for espionage, sabotage, or information warfare
Insider Threats
Employees or associates misusing access to harm an organization
Proactive Prevention
Recognize suspicious activity, avoid scams
Protection of Personal/Organizational Data
Safeguard sensitive information
Reduced Financial/Reputational Risk
Prevent costly breaches financial and reputational damage
Empowerment Through Knowledge
Users contribute to collective defense against evolving threats
Use Strong and Unique Passwords
Avoid using the same password on multiple sites.
Multi-Factor Authentication (MFA)
Adds extra security beyond passwords
Keep Software and Systems Updated
Regular updates fix security vulnerabilities
Install Reliable Security Software
Anti-virus and firewall protection are essential
Be Skeptical of Unknown Emails and Links
Avoid clicking suspicious attachments or links
Secure Personal Devices
Use encryption, screen locks, disable automatic connections to unknown networks.
Regularly Back Up Important Data
Protect against data loss from malware or hardware failure.
Hacking
Gaining unauthorized access to systems to computer systems, networks, or digital devices to exploit, manipulate, or damage data.
○ Not all hacking is malicious, but it is often linked to cybercriminal activities compromising security, privacy, and trust.
● Can range from subtle infiltration to aggressive system disruption.
○ Cybercriminals use various techniques to breach defenses and access sensitive information
Phishing (Hacking Method)
Tricks users into revealing personal or financial info via fake emails, websites, or messages
■ Often uses deceptive designs mimicking trusted organizations
Ransomware Attacks
Infects systems, encrypts critical data, and demands payment for restoration
■ Prevents users from accessing files until ransom is paid
Trojan Horses & Malware
Malicious software disguised as legitimate programs
■ Can damage systems or give attackers unauthorized control
Brute Force Attacks
Repeatedly guesses passwords to gain access
■ Exploits weak or common passwords
Software Vulnerability Exploitation
– Uses unpatched flaws in operating systems or applications
■ Allows attackers to infiltrate systems and compromise data integrity
Hacking Effects
Steal data, disrupt services, spy on users, take over networks
White-Hat Hackers (Ethical Hackers)
Cybersecurity professionals using skills ethically.
○ Employed by companies, governments, or security firms for penetration testing.
○ Goal: Identify vulnerabilities before malicious hackers exploit them.
○ Help strengthen digital security and protect data.
Black-Hat Hackers (Malicious Hackers)
– Hack networks or systems illegally for personal, financial, or political gain.
○ Actions: Data theft, unauthorized surveillance, malware spreading, shutting down services.
○ Threaten individuals, organizations, and national infrastructure
Gray-Hat Hackers (Ambiguous Ethics)
– Access systems without permission but not necessarily with harmful intent.
○ Goal: Expose security flaws, sometimes inform system owners afterward.
○ Still considered illegal due to lack of authorization.
Data Breaches (Impact of Hacking)
Loss of sensitive personal or organizational data
Financial Losses (Impact of Hacking)
Theft of money or resources via fraud
Service Disruption (Impact of Hacking)
Downtime of websites, apps, or networks
Reputation Damage (Impact of Hacking)
Loss of trust from users and public
Legal & Regulatory Penalties (Impact of Hacking)
– For organizations failing to protect data
Cracking
– act of breaking into software, systems, or networks by bypassing security measures like passwords or licensing restrictions to gain unauthorized access.
○ Commonly undertaken for illegal purposes like software piracy and software.
○ Gaining unauthorized, free access to premium or paid digital products
○ Primary Motives
■ Focused on circumventing restrictions applied by developers.
■ Specifically focuses on breaching protection mechanisms, software architectures, or data.
Digital Content (Common Targets Cracking)
– Cracking enables unauthorized access to movies, music, or e-books, often creating rights management system breaches.
Games (Common Targets Cracking)
– Frequently cracked to bypass purchase requirements or digital rights management, avoiding payments
Software (Common Targets Cracking)
– Developers implement license restrictions to counter software cracking, but it remains a primary target, leading to widespread piracy
Spread of Illegal Software (Effects of Cracking)
Cracked softwareis often shared, increasing prevalence of illegal copies and undermining intellectual property protections.
Malware Risks (Effects of Cracking)
Cracked files may contain malicious software, exposing users to enhanced risks like data theft, ransomware, or system damage
Loss of Income for Developers (Effects of Cracking)
Cracking deprives creators and developers of crucial revenue, impacting future product development.
Password Cracking (Common Types of Cracking)
– Involves using specialized tools and techniques to guess or break user passwords, often compromising sensitive accounts or devices.
Software Cracking (Common Types of Cracking)
– Entails the removal or bypassing of licensing systems, enabling unauthorized use of software applications without restrictions.
Encryption Cracking (Common Types of Cracking)
– Uses advanced tools to decode encrypted data, breaching protected information critical to industries or individuals.
Virus
Malicious software that replicates and spreads across systems
Virus Impact
Slow performance, corrupted files, system crashes, unusual behavior
Self-replicating malware
: Damages systems, steals data, or compromises functionality.
Attachment to Hosts
: Viruses attach to files or programs, activating when executed by users
Slow performance (Potential Impact Virus)
– A dramatic decrease in system speed can indicate infection.
Corrupted or missing files
– Files disappearing or being altered without user action.
System crashes (Potential Impact Virus)
– Frequent, unexpected reboots or errors caused by malicious activities disrupting system processes.
Unusual behavior (Potential Impact Virus)
– Unauthorized pop-ups, high network traffic, or unknown programs running may signify infection.
Malicious Downloads (How Viruses Spread)
– From unverified sources, peer-to-peer networks, or pirated media. Spread through unverified downloads
Infected Websites (How Viruses Spread)
– Visiting compromised sites can trigger automatic downloads
Email Attachments (How Viruses Spread)
– Hidden in phishing emails or unsolicited messages.
Worms (Common Types of Computer Viruses)
Standalone programs that don’t need a host file.
○ Exploit OS/app vulnerabilities to spread quickly.
○ Aim: steal data, corrupt files, consume resources.
File Infector Viruses (Common Types of Computer Viruses)
Attach to executable files and activate when file runs, can delete files, steal data, or replicate
Boot Sector Viruses (Common Types of Computer Viruses)
Target boot sectors of storage devices.
○ Loaded at startup, bypassing some security software.
○ Can corrupt data or crash systems.
Multipartite Viruses (Common Types of Computer Viruses)
– Hybrid of file infector and boot sector viruses.
○ Infects files and system sectors simultaneously.
○ Hard to detect and remove.
Polymorphic Viruses (Common Types of Computer Viruses)
– Change code/appearance with each infection.
○ Bypass traditional antivirus, disrupt operations, steal info
Overwrite Viruses (Common Types of Computer Viruses)
– Replace infected file contents with malicious code. Often targets executables → permanent data loss.
Trojan Horses (Common Types of Computer Viruses)
– Disguise as legitimate software.
○ Don’t self-replicate but enable data theft, surveillance, or system control.
Disconnect from Internet (BASIC VIRUS TROUBLESHOOTING)
Prevents virus spread or sending personal data to attackers.
Enter Safe Mode (BASIC VIRUS TROUBLESHOOTING)
Load only essential OS files, preventing full virus activation.
Run Full System Scan (BASIC VIRUS TROUBLESHOOTING)
Use updated antivirus/anti-malware software. Quarantine or delete threats.
Delete Temporary Files (BASIC VIRUS TROUBLESHOOTING)
Viruses often hide in temp folders; empty Recycle Bin.
Change Passwords (BASIC VIRUS TROUBLESHOOTING)
Once clean, update critical passwords using a trusted device
Software & System Security (PREVENTIVE MEASURES: virus)
– Install/maintain antivirus software with daily updates.
○ Keep OS and apps updated for security patches.
○ Enable firewall to monitor and block unauthorized access
Firewall
Blocks unauthorized access
Email Safety & Download Safety (PREVENTIVE MEASURES: virus)
– Don’t open attachments from unknown senders.
○ Scan removable media before use.
○ Download from official/verified sources only.
Password & Network Habits
– Use strong, unique passwords for each account.
○ Avoid unknown or suspicious links.
○ Regularly backup important data externally or in secure cloud.
Online Scams (OTHER TYPES OF INTERNET THREATS)
– Fake deals or emails trick users into sharing info or losing money.
Fake Information (OTHER TYPES OF INTERNET THREATS)
– Misleading or false content to manipulate politically, financially, or socially
Website Spoofing (OTHER TYPES OF INTERNET THREATS)
– Fake websites imitate legit ones to steal passwords or bank details
Rootkits & Scareware (OTHER TYPES OF INTERNET THREATS)
– Rootkits give hidden control; scareware uses fake warnings to install harmful software.
Cryptojacking (OTHER TYPES OF INTERNET THREATS)
– Exploits computers to mine cryptocurrency without consent.
Recognizing Safe Content (DIGITAL LITERACY AND ONLINE SAFETY)
– Discern reliable material, safeguard data, navigate online safely.
Core Digital Literacy (DIGITAL LITERACY AND ONLINE SAFETY)
– Verify website credibility, check source reputation, avoid untrustworthy platforms.
Evaluating Sources (DIGITAL LITERACY AND ONLINE SAFETY)
– Identify reliable vs. unreliable news or updates.
Avoiding Cyber Threats (DIGITAL LITERACY AND ONLINE SAFETY)
– Be cautious with links, downloads, and sharing personal info.
Digital Footprints (DIGITAL LITERACY AND ONLINE SAFETY)
– Stay mindful of traces online to protect data.
Promoting Awareness (DIGITAL LITERACY AND ONLINE SAFETY)
– Learn online threats and indicators to strengthen defense
Passwords (Best Practices For Online Safety)
– Use strong, unique passwords.
■ Enable 2-step verification. Use password managers to store passwords safely.
Cybersecurity Tools (Best Practices For Online Safety)
– Install antivirus software. Activate firewalls.
■ Use Virtual Private Networks (VPNs).